A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
Information
Published : 2019-06-07 11:29
Updated : 2023-02-12 15:33
NVD link : CVE-2019-10160
Mitre link : CVE-2019-10160
JSON object : View
CWE
CWE-172
Encoding Error
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- virtualization
- enterprise_linux
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_eus
netapp
- cloud_backup
- converged_systems_advisor_agent
python
- python
fedoraproject
- fedora
canonical
- ubuntu_linux
opensuse
- leap
debian
- debian_linux